Directory: Recently Added Listings

Oxygen?Forensic? Extractor offers OEM system builders and hardware manufacturers a unique opportunity to integrate a time-proven forensic acquisition system to their hardware-based solution without spending years developing in-house software. -?www.oxygen ...

"Oxygen?Forensic? Extractor for Clouds is the industry-first forensic solution that allows to acquire and?save data on PC from Google account, Apple iCloud, Microsoft Live and other cloud services like Dropbox, Box and BitCasa." -?www.oxygen-forensic.com/ ...

"PlainSight is a versatile computer forensics environment that allows inexperienced forensic practitioners perform common tasks using powerful open source tools.
We have taken the best open source forensic/security tools, customised them, and combined ...

"Registry forensics has long been relegated to analyzing only readily accessible Windows Registries, often one at a time, in a needlessly time-consuming and archaic way.
Registry Recon is not just another Registry parser. We have developed powerful new ...

Encrypted Disk Detector (v2 released 04/22/2013) is a command-line tool that can quickly and non-intrusively check for encrypted volumes on a computer system during incident response.
The decision can then be made to investigate further and determine w ...

"Magnet AXIOM builds on the powerful capabilities of IEF. With IEF you were able to recover more data from places other tools wouldn?t think to look. It?s why over 3,000 agencies and organizations around the world use and trust digital forensics solutions ...

"Magnet ACQUIRE is a software solution that enables digital forensic examiners to?quickly?and?easily?acquire forensic images of any iOS or Android device, hard drives, and removable media.?This powerful acquisition product is available at no cost to the f ...

"Designed for non-technical personnel in law enforcement, customs & border security, and parole & probation roles looking to conduct an on-scene search and preview of the Internet activity on a subject?s computer to qualify it for seizure." www.magnetfore ...

"Dropbox? Decryptor (v1.3 released 23/06/2014) from Magnet Forensics is a free tool that will decrypt the Dropbox filecache.dbx and config.dbx files, which are both encrypted SQLite databases. These two locations store information about files that have be ...

"Google Maps Tile Investigator (GMTI) allows users to download the x,y,z coordinates found in the tile filenames as well as surrounding tiles to show more context around an individual tile. It will also convert the x,y,z coordinates to their corresponding ...

"The IEF LEF Creator for EnCase v7 is an EnScript that creates an LEF from a pre-existing IEF case folder, enabling an examiner running IEF separately from EnCase to later incorporate the findings into EnCase v7." www.magnetforensics.com

"Magnet RAM Capture is a free imaging tool designed to capture the physical memory of a suspect?s computer, allowing investigators to recover and analyze valuable artifacts that are often only found in memory." www.magnetforensics.com

"EnCase?s Evidence Files (.E01) are similar to other documents in that they have structured internal metadata describing the evidence item, examiner, date acquired, etc?
EWF MetaEditor allows you to edit these properties in order to fix typos, rename i ...

"Whatever you decide to call them, Link Files, Shortcut Files, or Shell Link Items, they are valuable forensic artifacts. In addition the the filesystem MAC times, the internal structure of the link file can reveal huge amounts of data about the target fi ...

"It?s no secret that many document types can contain metadata that can reveal a wealth of information. This data can reveal information about the history, usage, authors, and contributors of a document. This data can be a great source of information for y ...

"The Microsoft Windows operating systems records artifacts when USB removable storage devices (thumb drives, iPods, digital cameras, external HDD, etc.) are connected. These artifacts can be found in Plug and Play (PnP) log files as well as the Windows Re ...

"UserAssist keys are method that Microsoft uses to populate a user?s start menu with frequently used applications. They exist on Windows XP, Vista, and 7 and maintain counts of application usage. These values are located in each user?s NTUSER.DAT hive at ...